General

  • Target

    zpgygxtRex.js

  • Size

    30KB

  • Sample

    220620-lpbx7scadq

  • MD5

    7c2e7e5a48421b27561a23936f1d9fee

  • SHA1

    739fde5b0ad4d2f651a16e2458bf3e64bfa748b0

  • SHA256

    c409b163881ea5ee746756d65f515f7a5dca8b622e6d1e557ef963acb6849000

  • SHA512

    149fe69bf7b778ca8e450c2b0d3c4b54a34023b908b8705a65d8da9d060b0e4e46346664f45e100969af3c21315f2bcd9f517ee99b94dfe5bf8134c9cf0dc323

Malware Config

Targets

    • Target

      zpgygxtRex.js

    • Size

      30KB

    • MD5

      7c2e7e5a48421b27561a23936f1d9fee

    • SHA1

      739fde5b0ad4d2f651a16e2458bf3e64bfa748b0

    • SHA256

      c409b163881ea5ee746756d65f515f7a5dca8b622e6d1e557ef963acb6849000

    • SHA512

      149fe69bf7b778ca8e450c2b0d3c4b54a34023b908b8705a65d8da9d060b0e4e46346664f45e100969af3c21315f2bcd9f517ee99b94dfe5bf8134c9cf0dc323

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks